AvalZ / modsecurity-cli
A CLI wrapper for libmodsecurity (v3.0.10)
☆11Updated 9 months ago
Related projects: ⓘ
- ☆69Updated 3 months ago
- Intelligence around common attacker behaviors (MITRE ATT&CK TTPs), in the form of ATT&CK Navigator "layer" json files.☆34Updated 2 years ago
- ☆79Updated last month
- A library of reference materials, tools, and other resources to aid threat profiling, threat quantification, and cyber adversary defense☆68Updated 9 months ago
- Algorithme d'apprentissage statistique permettant de créer un modèle sur les lignes de commandes des évènements "Création de Processus", …☆78Updated 6 months ago
- An LLM and OCR based Indicator of Compromise Extraction Tool☆28Updated 5 months ago
- Code for shelLM tool☆41Updated 9 months ago
- Taranis NG is an OSINT gathering and analysis tool for CSIRT teams and organisations. It allows team-to-team collaboration, and contains …☆90Updated this week
- Leveraging MISP indicators via a pDNS-based infrastructure as a poor man’s SOC.☆48Updated 2 weeks ago
- Repository of tools and resources for analyzing Docker containers☆57Updated 10 months ago
- Actively hunt for attacker infrastructure by filtering Shodan results with URLScan data.☆59Updated 2 months ago
- MITRE Engage™ is a framework for conducting Denial, Deception, and Adversary Engagements.☆59Updated 5 months ago
- Website for ail-typo-squatting library☆48Updated 3 months ago
- Signature based honeypot detector tool written in Golang☆74Updated 3 months ago
- Small web frontend for using openAI's GPT-3.5 and GPT-4's API☆50Updated last month
- ☆15Updated 4 months ago
- A collection of agents that use Large Language Models (LLMs) to perform tasks common on our day to day jobs in cyber security.☆38Updated 4 months ago
- Lightweight Python-Based Malware Analysis Pipeline☆29Updated this week
- ReconPal: Leveraging NLP for Infosec☆54Updated 2 years ago
- ☆40Updated 3 weeks ago
- This CALDERA Plugin converts Adversary Emulation Plans from the Center for Threat Informed Defense☆29Updated 7 months ago
- Lupo - Malware IOC Extractor. Debugging module for Malware Analysis Automation☆104Updated 2 years ago
- Track C2 servers, tools, and botnets over time by framework and location☆35Updated 10 months ago
- Graphical map of known Advanced Persistent Threats☆34Updated 11 months ago
- The IoT Security Testing Guide (ISTG) provides a comprehensive methodology for penetration tests in the IoT field, offering flexibility t…☆88Updated last month
- Enriching the NVD CVSS scores to include Temporal & Threat Metrics☆56Updated this week
- CALDERA plugin for adversary emulation of AI-enabled systems☆82Updated last year
- source code for the offsecml framework☆30Updated 3 months ago
- A home for detection content developed by the delivr.to team☆56Updated 2 weeks ago
- Extensible framework for analyzing publicly available information about vulnerabilities☆105Updated last week